Skip to main content
La privacidad dentro del sistema de persecución penal en Chile
    • by 
    •   4  
      Criminal ProcedurePrivacyProcedimientos PenalesPrivacidad
In “Physician Burnout Calls for Legal Intervention” (November-December 2019), Sharona Hoffman calls for a “requirement” in the form of a “mandate that health care employers measure physician wellness using the [Maslach Burnout Inventory]... more
    • by 
    •   14  
      PrivacyStigmaDiscriminationWell-Being
To the Lord
    • by 
    •   13  
      NursingPrivacySocial SupportQualitative Research
Data protection concerns have been identified as one of the most serious barriers for the deployment and development of cloud computing. 1 There is a general lack of regulation and policy on a European (EU) level. The Data Protection... more
    • by 
    •   8  
      Information SecurityEuropean LawPrivacyInformation Security and Privacy
    • by 
    •   59  
      PrivacyFighting and Preventing Corruption through LawPolitical ScienceSurveillance (Sociology)
This article examines changing rules and regimes 0/visibility on social media, using Facebook as a case study. Interpersonal social media surveillance warrants a care of the virtual self. Yet this care is complicated by social media's... more
    • by 
    •   4  
      PrivacySurveillance StudiesSocial MediaPeer-to-Peer
Background: There is increasing recognition of the need to identify risk factors for poor mental health in pregnancy and following birth. In New South Wales, Australia, health policy mandates psychosocial assessment and depression... more
    • by 
    •   15  
      Program EvaluationPrivacyDepressionSocial Support
Conferência ao IV Congresso Interativo Virtual "Humanos Direitos Máquinas - amigos ou inimigos". Universidad Nacional de Lanús / E-Justicia Latinoamérica, Argentina. Dia 20 de novembro de 2019. A mesma retoma a comunicação apresentada na... more
    • by 
    •   17  
      PrivacyIT lawPERSONAL DATA PROTECTIONEuropean Union Law
Güvenlik ve Gizlilik kavramları gelişen teknoloji ile birlikte günümüz dünyasında önemini arttırmıştır. Güvenlik kavramı, geçmiş zamanlarda fiziki tehditler ve bu tehditlere karşı alınabilecek önlemler ile sınırlı iken günümüzde özellikle... more
    • by 
    •   4  
      PrivacyData SecurityGizlilikSiber Güvenlik
I social media sono giunti alla soglia della maturità. Nei primi vent’anni di storia il loro numero è aumentato, i modelli comunicativi sono cambiati e sono nati nuovi assetti economici. I social media oggi sono naturalizzati e vengono... more
    • by 
    •   4  
      PrivacySocial MediaGenerationsFake News
The General Data Protection Regulation (GDPR) harmonizes personal data protection laws across the European Union, affecting all sectors including the healthcare industry. For processing operations that pose a high risk for data subjects,... more
    • by 
    •   8  
      Computer SciencePrivacySecurityFuture Internet
Location-Based Services (LBS) are becoming more prevalent. While there are many benefits, there are also real privacy risks. People are unwilling to give up the benefits - but can we reduce privacy risks without giving up on LBS entirely?... more
    • by  and +1
    •   9  
      Location Based ServicesPrivacyRisk ManagementMobile Computing
Policies can be used to customize a wide range of system behavior. People must have usable tools in order to author and maintain high-quality policies. In this paper we discuss policy templates as a mechanism for assisting people in... more
    • by  and +1
    •   9  
      PrivacyIterative MethodsPolicy ManagementOrganizations
Big Data can unify all patient related data to get a 360-degree view of the patient to analyze and predict outcomes. It can improve clinical practices, new drug development and health care financing process. It offers a lot of benefits... more
    • by 
    •   7  
      Machine LearningData MiningPrivacyHealth Care
One of the obstacles to improved security of the Internet is ad hoc development of technologies with different design goals and different security goals. This paper proposes reconceptualizing the Internet as a secure distributed system,... more
    • by 
    •   7  
      PrivacyInternet SecurityDistributed SystemDistributed Systems
Background: Since the early 1990s, a concerted effort has been made to develop community-and state-based immunization registries. A 1995 survey showed that nine states had laws specifically authorizing immunization registries. This survey... more
    • by 
    •   19  
      Information SystemsEducationPrivacyInformed Consent
A major problem for companies that develop and operate IT applications that process personal data of customers and employees is to ensure the protection of this data and to prevent privacy breaches. Failure to adequately address this... more
    • by 
    • Privacy
The era of big data introduces new considerations into the traditional context of research ethics. Ethical questions may be considered in terms of accuracy, humane treatment, informed participants, and the necessity and applicability of... more
    • by 
    •   5  
      Social Research Methods and MethodologyResearch EthicsPrivacyAnonymity
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenges: the protection of users' privacy and the assurance of... more
    • by 
    •   22  
      Information RetrievalPrivacyCryptographyDistributed System
Privacy has become one of the main impediments for e-health in its advancement to providing better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy... more
    • by  and +1
    •   6  
      Information SecurityPrivacyHealth CareTransparency
Radio Frequency Identification (RFID) has the potential to revolutionize the retail industry, yet the linking of this automatic identification (auto-ID) technology to consumer goods has resulted in widespread concern over the potential... more
    • by 
    •   8  
      PrivacyRFIDControlRegulation
The adoption of the Treaty of Lisbon and the granting to the Charter of Fundamental Rights of the same legal force as the Treaty has lent a new impulse to the consideration of fundamental human rights by the European Union (EU). The... more
    • by 
    •   6  
      Computer ScienceLawPrivacyPolitical Science
Mobile devices have become very popular nowadays, due to is portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution,... more
    • by 
    •   16  
      Computer ScienceInformation SecurityMachine LearningData Mining
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social networks and existing commercial systems for mobile location... more
    • by 
    •   10  
      Computer ScienceUsabilityPrivacyUbiquitous Computing
One of the main features of the technology is saving the personal information and the many ways to access this information and build many reports to use it to help the organizations to take the right decisions. The personal information... more
    • by 
    •   6  
      LawIntellectual PropertyPrivacySocial Science Research Network
Constitutional Guarantees of Information Privacy Protection in Light of New Technologies Development The development of new information technologies has contributed to a significant change in the methods of collection, processing and... more
    • by 
    •   5  
      Constitutional LawPrivacyHealth LawData Protection
There is widespread disagreement about the terms in which privacy ought to be defined and consequently about the scope of the concept. It is said to lack coherence, leading some to question its value for practical reasoning. In this essay... more
    • by 
    •   2  
      Political TheoryPrivacy
BioGrid Australia is a federated data linkage and integration infrastructure that uses the Internet to enable patient specific information to be utilized for research in a privacy protected manner, from multiple databases of various data... more
    • by 
    •   11  
      BioinformaticsGeneticsPrivacyComputational Biology
The primary focus of this study is to investigate which characteristics of health service quality are most likely to determine client satisfaction with health services among adolescents in Mongolia. Methods: Data were gathered from 1301... more
    • by 
    •   21  
      EthicsEducationResearch MethodologyPrivacy
    • by 
    •   3  
      EthicsPrivacyData Analysis
The first question that will be examined in this paper is whether IP addresses should be considered personal data. Even if many jurisdictions accept IP addresses as personal data, not every legal system takes this stance. Secondly as a... more
    • by 
    •   4  
      Intellectual PropertyPrivacyPrivacy and data protectionData Privacy
    • by 
    •   7  
      BusinessComputer SciencePrivacySME
Recently, attempts have been made to use Weblogs and other personal webpublishing technologies to support individual and social reflection in higher education. Weblogs can be highly individual and reflective in nature, and students’... more
    • by 
    •   9  
      Computer ScienceElectronic publishingPrivacyData Analysis
Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their businesses. Despite the huge benefits gained by SNS users, the huge amount of information exchanged by different users makes SNSs an easy target for... more
    • by 
    •   7  
      PrivacyOnline social networksInformationInformation Exchange
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
    • by 
    •   8  
      Information SecurityPrivacyInformation Security and PrivacyHealthcare
In this paper is presented a novel software solution for the implemention of a Student Management Information System at the University of Prishtina. The novelty of implemented solution is based on extending the subject name in X.509... more
    • by 
    •   3  
      PrivacyDigital SignatureSmart Cards
Vehicular Ad-hoc Networks (VANETs) will start becoming deployed within the next decade. Among other benefits, it is expected that VANETs will support applications and services targeting the increase of safety on the road, and assist in... more
    • by 
    • Privacy
This essay aims to address a general conception of what privacy is, as well as an analysis of the challenges and dangers of living without privacy and the importance of data protection against the breakdown of traditional paradigms by new... more
    • by 
    •   17  
      Information SecurityPrivacyData ManagementCyberculture
The crisis generated by the emergence of the new coronavirus and its rapid spread at global level has led states to implement measures to prevent and combat the effects of the pandemic. In the context in which the presence of the virus in... more
    • by 
    •   10  
      Health SciencesEpidemiologyHuman RightsPrivacy
    • by 
    •   14  
      PrivacySecrecyMedia EthicsCommunication Ethics
O presente trabalho não objetiva discutir a existência ou inexistência de um direito à tutela dos dados pessoais nem seus eventuais contornos, mas sim discutir estratégias regulatórias colocadas em prática, tendo como premissa a... more
    • by 
    •   9  
      PrivacyRegulation And GovernanceSelf-regulationPrivacy and data protection
    • by 
    •   15  
      Competition LawPrivacyEcommerceB2B E-Commerce
    • by 
    •   5  
      Location Based ServicesPrivacyPERSONAL DATA PROTECTIONGeospatial Information
Privacy is ondergeschikt aan gemeentelijke schatkist: digitale parkeermeters zijn erger dan de cookies van Facebook Civis Mundi Digitaal #52 door Lode Goukens Wie in Antwerpen nog wil parkeren moet net als in Utrecht en vele andere steden... more
    • by 
    • Privacy
An electronic voting system makes it possible for the voters to cast their ballots over the computer network. Hence, voters 11 can participate in elections without having to go to the polling places, which is more convenient and... more
    • by 
    •   12  
      PrivacyDigital SignatureInternet BankingCryptography
An Institute of Medicine (IOM) panel charged with reviewing the system for overseeing research involving children concluded in 2004 that Institutional Review Boards (IRBs), institutions engaged in research, and study sponsors should... more
    • by 
    •   31  
      GeneticsLawPediatricsApplied Ethics
The success of an intelligent sensor environment is mainly determined by the extent to which it is adopted by users. In order to understand how the adoption process works and when it is likely to be successful, we developed a general... more
    • by 
    •   7  
      SociologyPrivacyAdoptionTechnology and Society
engstler theorizes a continuum of 6 compliance positions for educators (Avoidance, Ignorance, Knowledgeable Non-Compliance, Approaching Compliance, Establishing Compliance, & Full Compliance) with regard to the application of British... more
    • by 
    •   7  
      Educational TechnologyTeacher EducationPrivacyPrivacy (Law)
In this book, Sandra Petronio, a Professor in the Department of Communication and the School of Medicine at Wayne State University, takes us through the labyrinth of privacy and disclosure issues that engulf the human person in all facets... more
    • by 
    • Privacy